OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0.
Metrics
Affected Vendors & Products
References
History
Fri, 27 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 26 Dec 2024 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | OpenCTI is an open-source cyber threat intelligence platform. Before 6.3.0, general users can access information that can only be accessed by users with access privileges to admin and support information (SETTINGS_SUPPORT). This is due to inadequate access control for support information (http://<opencti_domain>/storage/get/support/UUID/UUID.zip), and that the UUID is available to general users using an attached query (logs query). This vulnerability is fixed in 6.3.0. | |
Title | OpenCTI leaks support information due to inadequate access control | |
Weaknesses | CWE-200 CWE-285 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-12-26T21:34:48.751Z
Updated: 2024-12-27T16:19:19.600Z
Reserved: 2024-09-09T14:23:07.504Z
Link: CVE-2024-45805
Vulnrichment
Updated: 2024-12-27T16:19:15.515Z
NVD
Status : Received
Published: 2024-12-26T22:15:15.083
Modified: 2024-12-27T17:15:08.323
Link: CVE-2024-45805
Redhat
No data.